I have a user set up on the ASA local database with privilege level 5. When I add him to the default VPN group-policy his privilege level goes up to 15. How can i stop this as I want him to have only privilege level 5 ?
My AAA is as follows. I`m only using the local database on the ASA for my accounts.
aaa authentication enable console LOCAL
aaa authentication http console LOCAL
aaa authentication serial console LOCAL
aaa authentication ssh console LOCAL
aaa authentication telnet console LOCAL
aaa authorization command LOCAL
so this is when this user logs in to the ASA to make changes? they enter their creds, then go into enable mode, then 'sh priv' has them at 15? try putting them into another vpn group
When the user is not a member of any group and logs on they appear to have the correct privilege level. It`s when I add them to the default VPN group-policy that they seem to get privilege level 15 and I don`t know why as there isn`t any setting that should overide the configured users privilege level.
I tried creating another group-policy but it obviously inherits the credentials of the default VPN group-policy and gives me the same result.
Badenough,
Do you use the GUI? In there, the last thing I do after I've created and applied a local user is to edit that user's properties. (Configure :: Remote Access VPN :: AAA Setup :: User :: Edit). That is where & when I set their privileges.
You are right that creating a new group-policy starts as the default policy. Once I've saved it, I then modify it and save it again.
I`m running ASA version 7.2(2). Below is my config.
aaa authentication enable console LOCAL
aaa authentication http console LOCAL
aaa authentication serial console LOCAL
aaa authentication ssh console LOCAL
aaa authentication telnet console LOCAL
aaa authorization command LOCAL
group-policy DfltGrpPolicy attributes
banner none
wins-server none
dns-server none
dhcp-network-scope none
vpn-access-hours none
vpn-simultaneous-logins 3
vpn-idle-timeout 30
vpn-session-timeout none
vpn-filter none
vpn-tunnel-protocol IPSec l2tp-ipsec webvpn
password-storage disable
ip-comp disable
re-xauth disable
group-lock none
pfs disable
ipsec-udp disable
ipsec-udp-port 10000
split-tunnel-policy tunnelall
split-tunnel-network-list none
default-domain none
split-dns none
intercept-dhcp 255.255.255.255 disable
secure-unit-authentication disable
user-authentication disable
user-authentication-idle-timeout 30
ip-phone-bypass disable
leap-bypass disable
nem disable
backup-servers keep-client-config
msie-proxy server none
msie-proxy method no-modify
msie-proxy except-list none
msie-proxy local-bypass disable
nac disable
nac-sq-period 300
nac-reval-period 36000
nac-default-acl none
address-pools none
client-firewall none
client-access-rule none
webvpn
functions url-entry
html-content-filter none
homepage none
keep-alive-ignore 4
http-comp gzip
filter none
url-list none
customization value DfltCustomization
port-forward none
port-forward-name value Application Access
sso-server none
deny-message value Login was successful, but because certain criteria have not been met or due to some specific group policy, you do not have permission to use any of the VPN features. Contact your IT administrator for more information
svc none
svc keep-installer installed
svc keepalive none
svc rekey time none
svc rekey method none
svc dpd-interval client none
svc dpd-interval gateway none
svc compression deflate
group-policy Test internal
group-policy Test attributes
wins-server value 10.5.11.40 10.6.11.26
dns-server value 10.5.12.17 10.5.12.18
vpn-idle-timeout none
default-domain value test.org
address-pools value IT_VPN
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.